
G
LOSSARY
– 255 –
T
EMPORAL
K
EY
I
NTEGRITY
P
ROTOCOL
(TKIP)
A data encryption method designed as a replacement for WEP. TKIP avoids
the problems of WEP static keys by dynamically changing data encryption
keys.
T
RIVIAL
F
ILE
T
RANSFER
P
ROTOCOL
(TFTP)
A TCP/IP protocol commonly used for software downloads.
V
IRTUAL
A
CCESS
P
OINT
(VAP)
Virtual AP technology multiplies the number of Access Points present within
the RF footprint of a single physical access device. With Virtual AP
technology, WLAN users within the device.s footprint can associate with
what appears to be different access points and their associated network
services. All the services are delivered using a single radio channel,
enabling Virtual AP technology to optimize the use of limited WLAN radio
spectrum.
W
I
-F
I
P
ROTECTED
A
CCESS
WPA employs 802.1X as its basic framework for user authentication and
dynamic key management to provide an enhanced security solution for
802.11 wireless networks.
W
IRED
E
QUIVALENT
P
RIVACY
(WEP)
WEP is based on the use of security keys and the popular RC4 encryption
algorithm. Wireless devices without a valid WEP key will be excluded from
network traffic.
WPA P
RE
-
SHARED
K
EY
(WPA-PSK)
WPA-PSK can be used for small office networks with a limited number of
users that may not need a high level of security. WPA-PSK provides a
simple security implementation that uses just a pre-shared password for
network access.
Summary of Contents for EliteConnect SMCE21011
Page 1: ...USER GUIDE EliteConnectTM SMCE21011 802 11b g n AP SMCE21011...
Page 6: ...6...
Page 25: ...INDEX OF CLI COMMANDS 25...
Page 108: ...CHAPTER 9 Maintenance Settings Resetting the Access Point 108...
Page 113: ...CHAPTER 10 Status Information System Logs 113...
Page 231: ...CHAPTER 28 Link Layer Discovery Commands 231...
Page 239: ...CHAPTER 30 WMM Commands 239...